A Brief Overview of the Mobile App Ecosystem. September 13, 2012

Size: px
Start display at page:

Download "A Brief Overview of the Mobile App Ecosystem. September 13, 2012"

Transcription

1 A Brief Overview of the Mobile App Ecosystem September 13, 2012

2 Presenters Pam Dixon, Execu9ve Director, World Privacy Forum Jules Polonetsky, Director and Co- Chair, Future of Privacy Forum Nathan Good, PhD, Chief Scien9st at Good Research Ron Soffer, Independent App Developer, former app developer for WebMD Adam Towvim & MaP Tengler, VP of Business Development & Product Director at Jumptap Lia Sheena, Legal & Policy Fellow at the Future of Privacy Forum

3 Agenda Mobile Ecosystem Chart App Business Models Mobile Web Browser Overview Mobile Applica9on Ecosystem Data that can be Collected Technical & ToS Permissions No9ce & Design Considera9ons More on types of data: Loca9on, Photos, & Contacts Iden9fiers & Tracking Tracking & Opt- out Op9ons Ques9ons

4 The Mobile Ecosystem What is poten:ally involved in a for- profit mobile app

5 App Business Models PAID DOWNLOADS FREE; AD SUPPORTED FREEMIUM; IN- APP COMMERCE FREE; IN- APP REFERRALS

6 Mobile Web Browsers Typical Mobile Browser Privacy Controls Clear cookies Clear history Clear local storage Safari Default browser on ios Third- party cookie limita9ons Clearing cookies also clears Local Storage Android "Browser" is default; users can manually install the Chrome browser app Mozilla Do Not Track func9onality in mobile browser on Android: Tell sites not to track me

7 Na9ve, Web, or Hybrid Apps Na9ve app (ios, Android, Java) Web app (HTML5) Hybrid App

8 Contacts Photo Library Videos Camera/Video Sensor Microphone Text Messages Dialer Calendar Items Loca9on Reminders User entered info Social Integra9on features Mobile App Ecosystem Data Collected Can Include:

9 Handling of Sensi9ve Data Health Financial Children

10 The Apple ios Approach App Store Review Plus Sandboxing For security reasons, ios places each app (including its preferences and data) in a sandbox at install 9me. A sandbox is a set of fine- grained controls that limit the app s access to files, preferences, network resources, hardware, and so on. As part of the sandboxing process, the system installs each app in its own sandbox directory, which acts as the home for the app and its data. Important The purpose of a sandbox is to limit the damage that a compromised app can cause to the system. Sandboxes do not prevent apacks from happening to a par9cular app and it is s9ll your responsibility to code defensively to prevent apacks. For example, if your app does not validate user input and there is an exploitable buffer overflow in your input- handling code, an apacker could s9ll hijack your app or cause it to crash. The sandbox only prevents the hijacked app from affec9ng other apps and other parts of the system. (ios Developer Library) hpp://developer.apple.com/library/ios/#documentation/iphone/conceptual/iphoneosprogrammingguide/theiosenvironment/theiosenvironment.html

11 Technical Consent/Permission Models: Apple ios When does the OS automa:cally trigger a request for user permission before providing data? Loca9on data Apps that need access to loca9on including apps with access to photos and videos Triggers opt- in consent pop- up prior to use Access to other data without declaring in ios5 API BUT new in ios6: app developer must request access to Photos, Contacts, Reminders, and Calendar access which will trigger opt- in consent pop- up Loca:on Status Arrow icon appears when loca:on is accessed

12 Apple ios Ability to Edit Permissions & Add New Permissions Loca9on Opt- in No9ce Access to loca9on always triggers a pop- up consent request Developer can edit and add informa9on about the request in the descrip9on Developer can Op9onally Trigger other Permissions, e.g. pop- up permission prior to accessing or uploading contacts onto a server

13 Technical Consent/Permission Models: Google Android Community Review Plus Per App Sandboxing Developer decides permissions that the app will have Permissions declared to user before install Permissions cannot be changed while the program is running, they are sta9c Permissions allow for granular access and control of various parts of the phone as well as customer data Apps can be downloaded from the default Google Play app store or from independent app store

14 Sekng Permissions on Android Ac:ons Permissions Personal Info Permissions Hardware Sensor Permissions Determine permissions needed Describe permissions needed Display permissions to user User chooses to install or not System Ac9ons Permissions

15 Android Permissions: Sekng them up Developer creates a file called a manifest that has the permissions

16 Android Permissions What the User Sees

17 Technical Consent/Permission Models: Google Android Up Front No9ce designed to: Limit dialog boxes Provide transparency on programs ac9ons before install Give the user install/don t install choice before installa9on Be decided on before the program runs Security Architecture Limita9ons Reliance on one 9me customer consent and user apen9on upfront Android has no mechanism for gran9ng permissions dynamically (at run- 9me) because it complicates the user experience to the detriment of security. hpp://developer.android.com/guide/topics/security/ permissions.html

18 Terms of Service Consent Rqmts Apple ios You must provide clear and complete informa9on to users regarding Your collec9on, use and disclosure of user or device data. Sec$on of the ios Developer Program License Agreement. If consent is denied or withdrawn, Applica9ons may not collect, transmit, maintain, process or u9lize such data or perform any other ac9ons for which the user s consent has been denied or withdrawn. Sec$on of the ios Developer Program License Agreement. Google Android If the users provide you with, or your Product access or uses, user names passwords, or other log- in or personal informa9on, you must make users aware that this informa9on will be available to your app, and you must provide legally adequate privacy no9ce and protec9on for those users. Further, your Product may only use that informa9on for the limited purposes for which the user has given you permission to do so. Sec$on 4.3 of the Android Market Developer Distribu$on Agreement. MicrosoQ If your app enables access to and the use of any Internet- based services, or otherwise collects or transmits any user s personal informa9on, you must maintain a privacy policy Your privacy policy must (i) comply with applicable laws and regula9ons, (ii) inform users of the informa9on collected by your app and how that informa9on is used, stored, secured and disclosed, and (iii) describe the controls that users have over the use and sharing of their informa9on, and how they may access their informa9on. You must also provide access to your privacy policy in the app s sekngs as displayed in the Windows sekngs charm. Sec$on 3(f) of the App Developer Agreement.

19 Addi9onal (Op9onal) No9fica9ons Adding No:ce in Context outside of regular permissions

20 No9ce Design Considera9ons Screen Constraints Push no9fica9ons More than just popups, exploring alternate designs

21 Loca9on GPS Wi- Fi Cell towers Carriers and services that work with carriers, e.g. Locaid (subject to CTIA guidelines) Coarse loca9on (Android) Future? NFC

22 Contacts/Address Book Apple s ToS require app developers to request for access but not a technical permission yet (will be in ios6) Android s ToS require app developer no9fy user of personal info available to the app which is technical permission to read all of the contact (address) data stored on your phone

23 Photos & Calendar Photo/Video Library Android doesn t currently have a specific permission for photo or videos; obtain access to photos and videos by reques9ng permission to read data from storage cards subject to change ios triggers a loca9on permission upon reques9ng access to ALAssetsLibrary Calendar & Reminders Access to calendar on most mobile OSs, e.g. ios, Android, and Windows Cannot request access to phone reminders on ios5, but will be able to in ios6

24 Social Integra9on Features Facebook Connect Apple Game Center TwiPer sharing Google+ DeNa s Mobage Gree s Open Feint Papaya PlayPhone

25 Working with Third Par9es Analy9cs SDK Ad networks SDK Other intermediaries Behavioral Adver9sing Data appending Exploits and abuses

26 What Types of Data do Ad Networks Data App Mobile Web Device Type Opera9ng System App / URL Mobile Network IP Address Mobile Browser Carrier ID Device ID Loca9on Data Ad(s) Supported Conversions Typically Receive? Notes When on 2/3/4G connec9on, IP based Server- to- server ad calls a challenge Accessed via hpp headers UDID, Android ID, new ios ASAdver9ser Manager, etc. Granularity varies based on user/ publisher, but access to precise geographic loca9on only if app obtained user s consent Dimensions, MRAID, VAST Data sharing varies across app / web

27 Iden9fiers & Tracking App cookies are sandboxed Concerns around the use of device iden9fiers for app tracking Security Mechanisms for device iden9fiers Google AdMob requires that app developers send back hashed values of the UDID Many leading ad networks now hash the iden9fiers they receive on Android and ios Types of Iden9fiers Include: Android ID; can be wiped upon factory reset Apple UDID; linked to device, no controls to modify In August 2011, Apple announced plans to deprecate UDID access ios6 provides alterna9ve iden9fier that can reset by the user MAC Address; linked to device hardware, no controls to modify IMEI MEID Using ios Pasteboard Device Fingerprin9ng

28 Tracking & Opt- out Op9ons Disparate iden9fiers = disparate opt- out solu9ons Mobile ad networks and other leading companies have begun to offer opt- outs No consistent and single opt- out across app and mobile web Mul9ple steps to opt- out Device iden9fier not easily accessible by user Crea9ng awareness of available opt- outs FPF lists some companies that currently provide mobile opt- mobileprivacyop:ons.org

29 Tracking & Opt- out Op9ons Flurry opt-out Apple iad opt-out Jumptap opt-out Google AdMob Opt-out LeadBolt opt-out app

30 BREAKING NEWS: New Privacy Controls in ios6 Limit Ad Tracking is off by default. When the user turns it on, the iden9fier for adver9sers, ASAdver9serManager, can only be used for the following purposes: frequency capping, conversion events, es9ma9ng the number of unique users, security and fraud detec9on, and debugging.

31

32 Research for this presenta:on was prepared by Lia Sheena and Nathan Good with input from presenters.

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9 Copyright 2014 Splunk Inc. Splunk for Mobile Intelligence Bill Emme< Director, Solu?ons Marke?ng Panos Papadopoulos Director, Product Management Disclaimer During the course of this presenta?on, we may

More information

Beyond Strategy: Building Your Mobile Capabili6es

Beyond Strategy: Building Your Mobile Capabili6es Beyond Strategy: Building Your Mobile Capabili6es TASSCC Technology Educa6on Conference April 10, 2015 Presented by: Raj Polikepa6 Director of App Development Texas.gov Agenda ê Objec6ves of Mobile Strategy

More information

Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov

Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business. Dmitry Dessiatnikov Mobile Applica,on and BYOD (Bring Your Own Device) Security Implica,ons to Your Business Dmitry Dessiatnikov DISCLAIMER All informa,on in this presenta,on is provided for informa,on purposes only and in

More information

UAB Cyber Security Ini1a1ve

UAB Cyber Security Ini1a1ve UAB Cyber Security Ini1a1ve Purpose of the Cyber Security Ini1a1ve? To provide a secure Compu1ng Environment Individual Mechanisms Single Source for Inventory and Asset Management Current Repor1ng Environment

More information

Phone Systems Buyer s Guide

Phone Systems Buyer s Guide Phone Systems Buyer s Guide Contents How Cri(cal is Communica(on to Your Business? 3 Fundamental Issues 4 Phone Systems Basic Features 6 Features for Users with Advanced Needs 10 Key Ques(ons for All Buyers

More information

How To Manage A Mobile Device Management At Harvard

How To Manage A Mobile Device Management At Harvard Demys&fying Mobile Device Management Challenges Indir Avdagic Director of Informa.on Security and Risk Management, SEAS Objec&ves Our hope is that this conversa0on will get people thinking about mobile

More information

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars

Kaseya Fundamentals Workshop DAY THREE. Developed by Kaseya University. Powered by IT Scholars Kaseya Fundamentals Workshop DAY THREE Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 Day Two Overview Day Two Lab Review Patch Management Configura;on

More information

Norton Mobile Privacy Notice

Norton Mobile Privacy Notice Effective: April 12, 2016 Symantec and the Norton brand have been entrusted by consumers around the world to protect their computing devices and most important digital assets. This Norton Mobile Privacy

More information

Mobile Ad Tracking Impacts. App Marketing Results. How. Comparisons, advantages and limitations of today s ad tracking technologies

Mobile Ad Tracking Impacts. App Marketing Results. How. Comparisons, advantages and limitations of today s ad tracking technologies How Mobile Ad Tracking Impacts App Marketing Results Comparisons, advantages and limitations of today s ad tracking technologies Advertising Identifier Facebook ID Android Referrer Digital Fingerprinting

More information

Pu?ng B2B Research to the Legal Test

Pu?ng B2B Research to the Legal Test With the global leader in sampling and data services Pu?ng B2B Research to the Legal Test Ashlin Quirk, SSI General Counsel 2014 Survey Sampling Interna6onal 1 2014 Survey Sampling Interna6onal Se?ng the

More information

Adventures in Bouncerland. Nicholas J. Percoco Sean Schulte Trustwave SpiderLabs

Adventures in Bouncerland. Nicholas J. Percoco Sean Schulte Trustwave SpiderLabs Adventures in Bouncerland Nicholas J. Percoco Sean Schulte Trustwave SpiderLabs Agenda Introduc5ons Our Mo5va5ons What We Knew About Bouncer Research Approach & Process Phase 0 Phase 1 7 Final Test What

More information

Your Privacy Center. Online Privacy Statement. About the Information We Collect

Your Privacy Center. Online Privacy Statement. About the Information We Collect Your Privacy Center Your privacy is our priority. At Discover, our actions and decisions are guided by our mission to help people achieve a brighter financial future. And when it comes to your privacy,

More information

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik

Privacy- Preserving P2P Data Sharing with OneSwarm. Presented by. Adnan Malik Privacy- Preserving P2P Data Sharing with OneSwarm Presented by Adnan Malik Privacy The protec?on of informa?on from unauthorized disclosure Centraliza?on and privacy threat Websites Facebook TwiFer Peer

More information

March 10 th 2011, OSG All Hands Mee6ng, Network Performance Jason Zurawski Internet2 NDT

March 10 th 2011, OSG All Hands Mee6ng, Network Performance Jason Zurawski Internet2 NDT March 10 th 2011, OSG All Hands Mee6ng, Network Performance Jason Zurawski Internet2 NDT Agenda Tutorial Agenda: Network Performance Primer Why Should We Care? (15 Mins) GeNng the Tools (10 Mins) Use of

More information

APP-SOLUTELY SECURITY: The State of Mobile Security. CARTES Secure Connexions The Digital Security World MAY 14, 2014

APP-SOLUTELY SECURITY: The State of Mobile Security. CARTES Secure Connexions The Digital Security World MAY 14, 2014 APP-SOLUTELY SECURITY: The State of Mobile Security CARTES Secure Connexions The Digital Security World MAY 14, 2014 APP-SOLUTELY SECURITY: The State of Mobile Security Session Topics Current Sta*s*cs

More information

NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013.

NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013. NBA Math Hoops Privacy Statement and Children s Privacy Statement Updated October 17, 2013. This Privacy Statement applies to the web sites mobile applications provided by Learn Fresh Education Co. (collectively,

More information

Cloud Services MDM. Overview & Setup Admin Guide

Cloud Services MDM. Overview & Setup Admin Guide Cloud Services MDM Overview & Setup Admin Guide 10/27/2014 CONTENTS Systems Overview... 2 Solution Overview... 2 System Requirements... 3 Admin Console Overview... 4 Logging into the Admin Console... 4

More information

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential

platforms Android BlackBerry OS ios Windows Phone NOTE: apps But not all apps are safe! malware essential Best Practices for Smartphone Apps A smartphone is basically a computer that you can carry in the palm of your hand. Like computers, smartphones have operating systems that are often called platforms.

More information

Attendee Reference Guide

Attendee Reference Guide Attendee Reference Guide How To Login There are two ways to join a Jigsaw Mee2ng. Op,on 1: 1. Go to www.jigsawmee2ng.com 2. Click on the bu>on Join Mee,ng at the top of the homepage. This will take you

More information

Ad Tech for Privacy Counsel November 5, 2014. Marc M. Groman, President & CEO Network Advertising Initiative

Ad Tech for Privacy Counsel November 5, 2014. Marc M. Groman, President & CEO Network Advertising Initiative Ad Tech for Privacy Counsel November 5, 2014 Marc M. Groman, President & CEO Network Advertising Initiative Why? What We ll Cover This Morning: Basic Client Server Transactions Maintaining State What this

More information

Android Provenance: Debugging Device Disorders

Android Provenance: Debugging Device Disorders Android Provenance: Debugging Device Disorders Nathaniel Husted Indiana University Sharjeel Qureshi, Dawood Tariq, Ashish Gehani SRI Interna:onal Android OS Smartphone Opera:ng System by Google 49.4% Market

More information

Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com

Migrating to Hosted Telephony. Your ultimate guide to migrating from on premise to hosted telephony. www.ucandc.com Migrating to Hosted Telephony Your ultimate guide to migrating from on premise to hosted telephony Intro What is covered in this guide? A professional and reliable business telephone system is a central

More information

Using Mobile to Capture In- the- Moment Insights

Using Mobile to Capture In- the- Moment Insights With the global leader in sampling and data services Using Mobile to Capture In- the- Moment Insights Saran Ganesh Director, Mobile product marke8ng 2015 Survey Sampling Interna6onal 1 During this webcast

More information

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style

An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style An Integrated Approach to Manage IT Network Traffic - An Overview Click to edit Master /tle style Agenda A quick look at ManageEngine Tradi/onal Traffic Analysis Techniques & Tools Changing face of Network

More information

Honeycomb Crea/ve Works is financed by the European Union s European Regional Development Fund through the INTERREG IVA Cross- border Programme

Honeycomb Crea/ve Works is financed by the European Union s European Regional Development Fund through the INTERREG IVA Cross- border Programme Honeycomb Crea/ve Works is financed by the European Union s European Regional Development Fund through the INTERREG IVA Cross- border Programme managed by the Special EU Programmes Body. Web Analy*cs In

More information

Advantages of Cloud Managed WiFi Performance Tes9ng. Zaib Kaleem @wlanbook Work @AccessAgility

Advantages of Cloud Managed WiFi Performance Tes9ng. Zaib Kaleem @wlanbook Work @AccessAgility Advantages of Cloud Managed WiFi Performance Tes9ng Zaib Kaleem @wlanbook Work @AccessAgility Presenta9on Topics Test how network will be used Reduce cost to test and retest Future proof test sensors/hardware

More information

Bacula Open Source Project Bacula Systems (professional support)

Bacula Open Source Project Bacula Systems (professional support) Bacula Open Source Project Bacula Systems (professional support) The Enterprise Ready Open Source Network Backup Solu

More information

Introducing BRAD - the New Standard for Print on Demand

Introducing BRAD - the New Standard for Print on Demand Presenta0on materials and video replay will be provided within one week. Have ques0ons? Use the ques0ons panel during the Q&A recap at the end of the call. we ll field them as we go and Introducing BRAD

More information

HOW TO CREATE APPS FOR TRAINING. A step- by- step guide to crea2ng a great training app for your company

HOW TO CREATE APPS FOR TRAINING. A step- by- step guide to crea2ng a great training app for your company HOW TO CREATE APPS FOR TRAINING A step- by- step guide to crea2ng a great training app for your company From compliance and health & safety to employee induction and self-assessment, there are endless

More information

A WOLF IN SHEEP'S CLOTHING The Dangers of Persistent Web Browser Storage

A WOLF IN SHEEP'S CLOTHING The Dangers of Persistent Web Browser Storage Michael Su+on VP, Security Research A WOLF IN SHEEP'S CLOTHING The Dangers of Persistent Web Browser Storage Twi+er Ques9ons: @zscaler_su+on Who Am I? Company Zscaler SaaS solu9on for web browser security

More information

The Future of Maintaining State September 18, 2014 Presented By Marc Groman, Network Advertising Initiative Reed Freeman, Morrison & Foerster, LLP

The Future of Maintaining State September 18, 2014 Presented By Marc Groman, Network Advertising Initiative Reed Freeman, Morrison & Foerster, LLP mofo.com The Future of Maintaining State September 18, 2014 Presented By Marc Groman, Network Advertising Initiative Reed Freeman, Morrison & Foerster, LLP What is Maintaining State? Keeping track of a

More information

Develop a Native App (ios and Android) for a Drupal Website without Learning Objective-C or Java. Drupaldelphia 2014 By Joe Roberts

Develop a Native App (ios and Android) for a Drupal Website without Learning Objective-C or Java. Drupaldelphia 2014 By Joe Roberts Develop a Native App (ios and Android) for a Drupal Website without Learning Objective-C or Java Drupaldelphia 2014 By Joe Roberts Agenda What is DrupalGap and PhoneGap? How to setup your Drupal website

More information

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty Offensive & Defensive & Forensic Techniques for Determining Web User Iden

More information

Overview of SOTI. www.so%.net

Overview of SOTI. www.so%.net Overview of SOTI www.so%.net World s Most Trusted MDM Vendor 12,000+ customers, millions of devices managed worldwide Since 1995, SOTI Inc. has been developing industry - leading technology that solves

More information

AdvancedMD Online Privacy Statement

AdvancedMD Online Privacy Statement AdvancedMD Online Privacy Statement Effective date: September 1, 2015 This Privacy Statement explains how AdvancedMD uses and discloses personal information that we collect from people who visit our websites

More information

Install and End User Reference Guide for Direct Access to Citrix Applications

Install and End User Reference Guide for Direct Access to Citrix Applications Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a

More information

Put the Magic in Your Email Marke4ng

Put the Magic in Your Email Marke4ng Put the Magic in Your Email Marke4ng April 8, 2015 Michelle Novak mnovak@presslaff.com Your Inland Wizards Put the Magic in Your Email Marke4ng Stop blas9ng messages and start crea9ng compelling engaging

More information

Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy.

Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy. MOBILE APPLICATION PRIVACY POLICY Advanced Diagnostics Limited ( We ) are committed to protecting and respecting your privacy. SCOPE OF POLICY This policy (together with our end-user licence agreement

More information

TOY INDUSTRY CHECKLIST FOR MOBILE APPS AND PROMOTIONS

TOY INDUSTRY CHECKLIST FOR MOBILE APPS AND PROMOTIONS TOY INDUSTRY CHECKLIST FOR MOBILE APPS AND PROMOTIONS JULY 2012 Overview Members of the toy industry are fast embracing the world of mobile applications ( apps ). Apps offer a new world of engaging content

More information

REST (Representa.onal State Transfer) Ingegneria del So-ware e Lab. Università di Modena e Reggio Emilia Do<. Marzio Franzini

REST (Representa.onal State Transfer) Ingegneria del So-ware e Lab. Università di Modena e Reggio Emilia Do<. Marzio Franzini REST (Representa.onal State Transfer) Ingegneria del So-ware e Lab. Università di Modena e Reggio Emilia Do

More information

BBVA Wallet Application Privacy Policy

BBVA Wallet Application Privacy Policy BBVA Wallet Application Privacy Policy Effective date: September 14, 2015 This Privacy Policy describes our practices related to the use, storage and disclosure of information we collect from or about

More information

Apple Deployment Programs Apple ID for Students: Parent Guide

Apple Deployment Programs Apple ID for Students: Parent Guide Apple Deployment Programs Apple ID for Students: Parent Guide As a parent or guardian, you want the best learning environment for your student. One that makes learning relevant for each student and allows

More information

Email/Endpoint Security and More Rondi Jamison

Email/Endpoint Security and More Rondi Jamison Email/Endpoint Security and More Rondi Jamison Sr. Marke)ng Manager - Enterprise Security Strategy Agenda 1 Why Symantec? 2 Partnership 3 APS2 Packages 4 What s next Copyright 2014 Symantec Corpora)on

More information

Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS

Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Copyright 2014 Splunk Inc. Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Dritan Bi=ncka BD Solu=ons Architecture Disclaimer During the course of this presenta=on, we may make forward looking statements

More information

Regula'ons on Online Video and Internet TV 18/07/2014

Regula'ons on Online Video and Internet TV 18/07/2014 Regula'ons on Online Video and Internet TV 18/07/2014 Regula'ons on Internet Television (P1) On 14 August 2009, SARFT issue the No8ce on Management of providing Audiovisual Programming Over Internet- Connected

More information

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time.

SYNCSHIELD FEATURES. Preset a certain task to be executed. specific time. SYNCSHIELD FEATURES This document describes the diversity of SyncShield features. Please note that many of the features require a certain platform version, often earlier software versions do not support

More information

configurability compares with typical SIEM & Log Management systems Able to install collectors on remote sites rather than pull all data

configurability compares with typical SIEM & Log Management systems Able to install collectors on remote sites rather than pull all data Software Comparison Sheet SIEM & Log OpViewTM from Software leverages a completely new database architecture to deliver the most flexible monitoring system available on the market today. This award-winning

More information

configurability compares with typical Asset Monitoring systems Able to install collectors on remote sites rather than pull all data

configurability compares with typical Asset Monitoring systems Able to install collectors on remote sites rather than pull all data Software Comparison Sheet OpViewTM from Software leverages a completely new database architecture to deliver the most flexible monitoring system available on the market today. This award-winning solution

More information

Mobility in the Modern Factory. Discussion of Mobile Adop7on for the Factories of the Future

Mobility in the Modern Factory. Discussion of Mobile Adop7on for the Factories of the Future Mobility in the Modern Factory Discussion of Mobile Adop7on for the Factories of the Future Talking Points History Lesson The Reasons for Going Mobile Mobile Infrastructure Mobile Device Security BYOD

More information

Sophos Ltd. All rights reserved.

Sophos Ltd. All rights reserved. Sophos Ltd. All rights reserved. 1 Sophos Approach to Unified Security Integrated Security for Be9er Protec;on James Burchell & Greg Iddon, Sales Engineers UK&I, Technology Services What we re going to

More information

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty

Offensive & Defensive & Forensic Techniques for Determining Web User Iden<ty Offensive & Defensive & Forensic Techniques for Determining Web User Iden

More information

LMS. OSI Layers and the Learning Management System. Over view

LMS. OSI Layers and the Learning Management System. Over view Over view A Learning is an applica7on located on a local network or the Internet, developed for the employment of electronic educa7onal technology by students across distances from a building with mul7ple

More information

PRIVACY POLICY. Your Personal Information will be processed by Whistle Sports in the United States.

PRIVACY POLICY. Your Personal Information will be processed by Whistle Sports in the United States. PRIVACY POLICY This Policy was last changed on March 31, 2015. Kids Sports Entertainment, Inc. d/b/a The Whistle ( Whistle Sports ) and its affiliates operate this website, and any and all Whistle Sports

More information

This presenta,on covers the essen,al informa,on about IT services and facili,es which all new students will need to get started.

This presenta,on covers the essen,al informa,on about IT services and facili,es which all new students will need to get started. This presenta,on covers the essen,al informa,on about IT services and facili,es which all new students will need to get started. 1 Most of the informa,on is covered in more depth on the Informa,on Services

More information

999GPS.net Tracking Platform Operation Guide

999GPS.net Tracking Platform Operation Guide 999GPS.net Tracking Platform Operation Guide Welcome to use this Real Time GPS tracking platform, This software is web based system, it is not necessary to download any software or any plug-in software,

More information

Best Practices for Mobile Application Developers. App Privacy Guidelines by the Future of Privacy Forum and the Center for Democracy & Technology

Best Practices for Mobile Application Developers. App Privacy Guidelines by the Future of Privacy Forum and the Center for Democracy & Technology Best Practices for Mobile Application Developers App Privacy Guidelines by the Future of Privacy Forum and the Center for Democracy & Technology Table of Contents 1 2 3 8 11 12 14 15 17 17 Introduction

More information

Using the owncloud Android App

Using the owncloud Android App Using the owncloud Android App Accessing your files on your owncloud server via the Web interface is easy and convenient, as you can use any Web browser on any operating system without installing special

More information

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones Network Security Security in Compu5ng, Chapter 7 Topics l Network AAacks l Reconnaissance l AAacks l Spoofing l Web Site Vulnerabili5es l Denial of Service l Network Defences l Firewalls l Demilitarised

More information

Remote Access End User Reference Guide for SHC Portal Access

Remote Access End User Reference Guide for SHC Portal Access Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

Threat Model for Mobile Applications Security & Privacy www.datatheorem.com

Threat Model for Mobile Applications Security & Privacy www.datatheorem.com Overview Mobile applications (and the devices they run on) are powerful, as they can play music, check email, read documents, purchase products, get directions, play games, watch movies, scan barcodes,

More information

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u Demo Access AUTHOR: System4u BlackBerry Universal Device Service Revisions Date Version Description Author June 26 th 2012 1.0 Roman Přikryl September 25 th 2012 1.5 Revision Roman Přikryl October 5 th

More information

Student Getting Started Guide

Student Getting Started Guide with with Student Getting Started Guide TABLE OF CONTENTS Table of Contents FIRST STEPS TO ENSURE SUCCESS... 3 Ensure System Requirements are met on Your Computer... 3 Find Out Which Operating System Is

More information

Send and receive encrypted e-mails

Send and receive encrypted e-mails Manual Send and receive encrypted e-mails Bank J. Safra Sarasin Ltd Document Owner Security Classification Document Type Bank J. Safra Sarasin Ltd internal and external use Manual Document change history

More information

Guide to the 2015 Vascular Annual Meeting Mobile App

Guide to the 2015 Vascular Annual Meeting Mobile App Guide to the 2015 Vascular Annual Meeting Mobile App Download at www.vsweb.org/mobileapp What the App Does 1 Getting Started 5 Troubleshooting Common Problems 6 Support 7 Task Force for App and Program

More information

Kaseya 2. User Guide. Version 7.0. English

Kaseya 2. User Guide. Version 7.0. English Kaseya 2 Mobile Device Management User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

Tes$ng Web Applica$ons. Willem Visser RW334

Tes$ng Web Applica$ons. Willem Visser RW334 Tes$ng Web Applica$ons Willem Visser RW334 Overview Tes$ng Theory Tes$ng Web Apps Tools A test consists of The Basics Input Expected output (also called the Oracle) White Box Tes$ng Considering the code

More information

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction

Privacy Policy. If you have questions or complaints regarding our Privacy Policy or practices, please see Contact Us. Introduction Privacy Policy This Privacy Policy will be effective from September 1 st, 2014. Please read Pelican Technologies Privacy Policy before using Pelican Technologies services because it will tell you how we

More information

Pentesting Mobile Applications

Pentesting Mobile Applications WEB 应 用 安 全 和 数 据 库 安 全 的 领 航 者! 安 恒 信 息 技 术 有 限 公 司 Pentesting Mobile Applications www.dbappsecurity.com.cn Who am I l Frank Fan: CTO of DBAPPSecurity Graduated from California State University as a Computer

More information

Common App Online: The Applicant Perspec5ve

Common App Online: The Applicant Perspec5ve Common App Online: The Applicant Perspec5ve Agenda This presenta,on looks at the processing life cycle of a student s applica,on from registra,on to submission. The CAO 2011-12 Common Applica,on Registra,on

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

DESTINATION MELBOURNE PRIVACY POLICY

DESTINATION MELBOURNE PRIVACY POLICY DESTINATION MELBOURNE PRIVACY POLICY 2 Destination Melbourne Privacy Policy Statement Regarding Privacy Policy Destination Melbourne Limited recognises the importance of protecting the privacy of personally

More information

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app

Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly

More information

Legacy Archiving How many lights do you leave on? September 14 th, 2015

Legacy Archiving How many lights do you leave on? September 14 th, 2015 Legacy Archiving How many lights do you leave on? September 14 th, 2015 1 Introductions Wendy Laposata, Himforma(cs Tom Chase, Cone Health 2 About Cone Health More than 100 loca=ons 6 hospitals, 3 ambulatory

More information

GETS AIRWATCH MDM HANDBOOK

GETS AIRWATCH MDM HANDBOOK GETS AIRWATCH MDM HANDBOOK October 2014 Abstract Using AirWatch, a mobile device management tool, within the public sector. GTA Product and Services Group EXECUTIVE SUMMARY.. 2 INTRODUCTION TO THE GETS

More information

Portal Recipient Guide

Portal Recipient Guide Portal Recipient Guide Lindenhouse Software Limited 2015 Contents 1 Introduction... 4 2 Account Activation... 4 3 Forgotten Password... 9 4 Document signing... 12 5 Authenticating your Device & Browser...

More information

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual

GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual GadgetTrak Mobile Security Android & BlackBerry Installation & Operation Manual Overview GadgetTrak Mobile Security is an advanced software application designed to assist in the recovery of your mobile

More information

Mobile Phone & Website Tracking Platform Operation Guide

Mobile Phone & Website Tracking Platform Operation Guide Mobile Phone & Website Tracking Platform Operation Guide This software is web based system, for users to logon with given user name & password to locate the tracker s current location, play back the history

More information

Defending Against Web App A0acks Using ModSecurity. Jason Wood Principal Security Consultant Secure Ideas

Defending Against Web App A0acks Using ModSecurity. Jason Wood Principal Security Consultant Secure Ideas Defending Against Web App A0acks Using ModSecurity Jason Wood Principal Security Consultant Secure Ideas Background Info! Penetra?on Tester, Security Engineer & Systems Administrator!!!! Web environments

More information

CSE/ISE 311: Systems Administra5on Logging

CSE/ISE 311: Systems Administra5on Logging Logging Por$ons courtesy Ellen Liu Outline Introduc$on Finding log files Syslog: the system event logger Linux logrotate tool Condensing log files to useful informa$on Logging policies 13-2 Who and Why

More information

End User Devices Security Guidance: Apple ios 8

End User Devices Security Guidance: Apple ios 8 GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy

More information

App Reputation Report February 2013 The Authority in App Security

App Reputation Report February 2013 The Authority in App Security App Reputation Report February 2013 The Authority in App Security Introduction The Appthority App Report for February 2013 provides an overview of the security risks behind 100 free ios and Android apps.

More information

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5

1. Introduction... 1. 2. Activation of Mobile Device Management... 3. 3. How Endpoint Protector MDM Works... 5 User Manual I Endpoint Protector Mobile Device Management User Manual Table of Contents 1. Introduction... 1 1.1. What is Endpoint Protector?... 2 2. Activation of Mobile Device Management... 3 2.1. Activation

More information

A Publication of FastSpring. FastSpring. Advertiser. QuickStart Guide. Ten Steps to Get Up and Running Quickly in the FastSpring Affiliate Program

A Publication of FastSpring. FastSpring. Advertiser. QuickStart Guide. Ten Steps to Get Up and Running Quickly in the FastSpring Affiliate Program A Publication of FastSpring FastSpring Advertiser QuickStart Guide Ten Steps to Get Up and Running Quickly in the FastSpring Affiliate Program Welcome to the FastSpring Affiliate Program (powered by Impact

More information

Deploying Management and Security Agents to Mobile Devices. Deploying Mgmt and Security Agents

Deploying Management and Security Agents to Mobile Devices. Deploying Mgmt and Security Agents Deploying Management and Security Agents to Mobile Devices John Engels Principal Product Manager Symantec Scott Jareo Field Enablement Engineering Symantec Agenda 1 Symantec MDM Agent Options 2 Mobile

More information

AVG Business SSO Partner Getting Started Guide

AVG Business SSO Partner Getting Started Guide AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in

More information

WebRTC-powered ICEWARP VERSION 11.1. www.icewarp.com

WebRTC-powered ICEWARP VERSION 11.1. www.icewarp.com WebRTC-powered ICEWARP VERSION 11.1 IceWarp 11.1 is the industry-first messaging solution that offers WebRTC-powered voice and video calls, online meetings and chat. All you need is an enabled browser.

More information

2003-2015 Take 5 Solutions - All Rights Reserved.

2003-2015 Take 5 Solutions - All Rights Reserved. 2003 - Take 5 Solutions - All Rights Reserved. Overview Why Take 5 Solu/ons? Take 5's Unique Advantages Leadership Team Product Offerings Direct Mail List Rental Email List Rental and Retarge/ng Social

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

Kaseya 2. User Guide. Version 1.0

Kaseya 2. User Guide. Version 1.0 Kaseya 2 Mobile Device Management User Guide Version 1.0 March 12, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Online and Mobile Privacy Notice ( Privacy Notice )

Online and Mobile Privacy Notice ( Privacy Notice ) Online and Mobile Privacy Notice ( Privacy Notice ) Introduction This Privacy Notice applies to the operations of Cigna Global Health Benefits and its affiliated companies listed at the end of this Privacy

More information

ENGINEERED EFFICIENCY. FlexNET Server. Administraon Guide. Contact & informaon:

ENGINEERED EFFICIENCY. FlexNET Server. Administraon Guide. Contact & informaon: ENGINEERED EFFICIENCY FlexNET Server Administraon Guide Contact & informaon: CAXperts GmbH Carl-Zeiss-Ring 4 85737 Ismaning Germany P.: +49 89 96 97 72 0 F.: +49 89 96 97 72 11 E.: info@caxperts.com FlexLM

More information

FTC Data Security Standard

FTC Data Security Standard FTC Data Security Standard The FTC takes the posi6on (Being tested now in li6ga6on) that Sec6on 5 of the FTC Act requires Reasonable Security under the circumstances: that companies have reasonable controls

More information

Incident Response Using Splunk for State and Local Governments

Incident Response Using Splunk for State and Local Governments Copyright 2013 Splunk Inc. Incident Response Using Splunk for State and Local Governments Bert Hayes Solu=ons Engineer bert@splunk.com #splunkconf Legal No=ces During the course of this presenta=on, we

More information

Advanced Archive- It Applica2on Training: Archiving Social Networking and Social Media Sites

Advanced Archive- It Applica2on Training: Archiving Social Networking and Social Media Sites Advanced Archive- It Applica2on Training: Archiving Social Networking and Social Media Sites 1 Agenda Overview of Social Networking/Media sites Why archive these sites? Typical Challenges Best Prac2ces:

More information

How To Login To Webex Online

How To Login To Webex Online Getting Prepared for Your Online Course! This document will let you know what to expect and walk you through a Test Login One of our top priorities is to meet your demand for high quality, easy to use,

More information

Installing Citrix for Mac

Installing Citrix for Mac Installing Citrix for Mac 1) Go to: http://receiver.citrix.com. 2) Click on Download Receiver. 3) On the bottom left hand corner of your computer screen, the Citrix Download should appear. Click on that

More information

Design considera-ons and Guiding Principles for Implemen-ng Cloud Security. William Stearns Security Analyst CloudPassage

Design considera-ons and Guiding Principles for Implemen-ng Cloud Security. William Stearns Security Analyst CloudPassage Design considera-ons and Guiding Principles for Implemen-ng Cloud Security William Stearns Security Analyst CloudPassage In a nutshell How do Cloud Servers differ from Data Center Servers? How do the differences

More information

Open- Xchange OXtender for cpanel

Open- Xchange OXtender for cpanel Open- Xchange OXtender for cpanel 20111010 Partner for Success» Leading technology provider of hosted groupware» More than 24 million users (end of 2010)» SaaS Partners include 1&1 Internet, STRATO, Network

More information